{"title":"Throughput and QoS optimization in nonuniform multichannel wireless mesh networks","authors":"T. Szymanski","doi":"10.1145/1454586.1454589","DOIUrl":"https://doi.org/10.1145/1454586.1454589","url":null,"abstract":"A technology to increase throughput and QoS in infrastructure-based Wireless Mesh Networks (WMNs) is proposed. In a uniform WMN, let each Base Station (BS) have R1 transceivers for communications with neighboring BSs, and R2 transceivers for communications with the Stationary and Mobile Subscribers within the wireless cell. One Gateway BS provides access to the global Internet, and the throughput capacity of the entire WMN is constrained by the IO bandwidth of the Gateway. A small number of extra wireless links can be added to the Gateway BS and selected other BSs, resulting in a nonuniform system. The addition of an asymptotically small number of transceivers can increase WMN capacity several fold. Efficient scheduling requires the partitioning of an asymmetric bipartite graph representing a general traffic rate matrix, into multiple graphs representing doubly-stochastic matrices. Routing and scheduling algorithms presented. The algorithms can provision long-term multimedia flows including VOIP or IPTV with guaranteed service. For multichannel WMNs where the traffic is routed and partitioned, the number of queued cells per BS is near-minimal and bounded, the end-to-end delay and jitter are near-minimal and bounded, and cell loss rates due to scheduling conflicts are zero. The algorithm also achieves 100% of capacity.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114496188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks","authors":"G. Cecchetti, A. L. Ruscelli","doi":"10.1145/1454586.1454588","DOIUrl":"https://doi.org/10.1145/1454586.1454588","url":null,"abstract":"IEEE 802.11 standard for wireless networks recently has been enhanced with IEEE 802.11e amendment to this protocol which introduces Quality of Service support. It provides differentiation mechanisms at the Medium Access Control layer, using two additional access functions: the Enhanced Distributed Channel Access (EDCA) function and the HCF Controlled Channel Access (HCCA) function.\u0000 The EDCA function is based on a distributed control and enables prioritized channel access while the latter requires centralized scheduling and allows the applications to negotiate parameterized service guarantees. Only HCCA mechanism is suitable for serving traffic streams with real-time requirements such as multimedia applications and Voice Over IP. The IEEE 802.11e standard does not specify a mandatory HCCA scheduling algorithm, while it offers a reference scheduler.\u0000 In this paper we analyze four HCCA schedulers which are alternative to the reference one and which offer real-time guarantees. A performance evaluation through simulation is conducted to show the main differences between the considered schedulers, including the reference one.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive traffic filtering for efficient and secure IP-mobility","authors":"Mirco Marchetti, M. Colajanni","doi":"10.1145/1454586.1454594","DOIUrl":"https://doi.org/10.1145/1454586.1454594","url":null,"abstract":"The Mobile IP (MIP) protocol that supports node mobility in IP networks may be implemented through two routing schemes: triangular routing and reverse tunneling. While triangular routing guarantees better performance because of shorter routing paths, it is not compatible with egress filtering policies enforced by many firewalls. As a result, it is necessary to recur to the slower reverse tunneling routing scheme that causes lower mobile connection throughput and higher round trip times. In this paper, we propose an innovative adaptive traffic filtering technique in which egress filtering rules are dynamically and automatically modified to reflect the presence of mobile nodes inside the protected network. The proposed scheme, called secure triangular routing, guarantees the best trade-off between performance and security because it enables triangular routing without violating network security policies. Viability and performance improvements of the proposed solution have been demonstrated by experiments carried out through a prototype. The proposed solution does not require any modification in correspondent nodes or in their networks, and it fully complies with the MIP protocol specifications.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132158809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast, secure handovers in 802.11: back to the basis","authors":"R. Marques, A. Zúquete","doi":"10.1145/1454586.1454592","DOIUrl":"https://doi.org/10.1145/1454586.1454592","url":null,"abstract":"This article presents a fast, secure handover protocol for 802.11 networks. The protocol keeps the security functionalities of 802.1X but uses a new reauthentication protocol that promotes fast handovers during reassociations. The reauthentication protocol recovers the original 802.11 paradigm: authenticate first, reassociate next. Following this paradigm, we conceived two new 802.11 authentication and reassociation protocols, which allow a mobile station to perform 802.1X reauthentications before reassociations with the same functionality of a complete 802.1X authentication. Furthermore, reassociation protocols are authenticated, preventing denial-or-service scenarios that are not handled by 802.11i. Our new approach requires little from the environment, namely a new, central Reauthentication Service, for storing data used in the reauthentication of stations. The time of security-related tasks that contribute to handover delays was dramatically reduced to 1.5 ms, while an 802.1X fast resume takes more than 150 ms. Finally, our protocol addresses most design goals and problems stated by standards' working groups for fast, secure roaming in 802.11.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TSR: trust-based secure MANET routing using HMMs","authors":"M. Moe, B. Helvik, S. J. Knapskog","doi":"10.1145/1454586.1454602","DOIUrl":"https://doi.org/10.1145/1454586.1454602","url":null,"abstract":"In this paper we propose a trust-based security extension to the mobile ad hoc network dynamic source routing protocol (DSR), where the state probability of a node, according to its corresponding hidden Markov model (HMM), is being used for deciding the node's trustworthiness. Our approach detects the selective packet dropping behavior of selfish nodes that could not be detected or defended against with previous suggested solutions. Packet-dropping nodes that are acting selfishly by selectively dropping packets and not sharing their bandwidth with the rest of the network, are excluded from the network. Thus enforcing cooperation among nodes and removing the incentives for selfish node behavior.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133662547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure authentication and management scheme for RFID","authors":"Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho","doi":"10.1145/1454586.1454605","DOIUrl":"https://doi.org/10.1145/1454586.1454605","url":null,"abstract":"This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be applied in the ubiquitous computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the passive-tag-performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive/active-tag management technique based on a secure password-based system, with the RFID tag authentication system, is proposed in this study. This system performs a secure authentication process and provides an efficient and secure management system.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133936402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed resource management scheme for load-balanced QoS provisioning in heterogeneous mobile wireless networks","authors":"S. Ahmad, M. Qadir, M. Akbar","doi":"10.1145/1454586.1454598","DOIUrl":"https://doi.org/10.1145/1454586.1454598","url":null,"abstract":"Quality of Service (QoS) provisioning in wireless networks quickly leads to scalability problem due to hard resource allocation of each session. Heterogeneous wireless environment provides alternative resources, but the complexity of handling such system is very high. In this paper, we present a virtual resource provisioning (VPR) scheme that collaborates with co-located wireless networks regarding resource availability and estimates resource release in near future to maintain predictive resource list for optimal resource utilization. Resource utilization is further supported by a fine-grained QoS service sub-class design for making precise resource allocation. These sub-classes map demanded QoS requirements to their subset, enabling more resource availability. Results show that much higher call admission rates are achieved by integrating virtual resource provisioning and load-balancing approach.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-network optimal rate reduction for packetized MPEG video","authors":"G. Ravindra, Joseph Thaliath, I. Chakeres","doi":"10.1145/1454586.1454597","DOIUrl":"https://doi.org/10.1145/1454586.1454597","url":null,"abstract":"Bottleneck links in network elements cause packet queues to overflow thereby resulting in random packet loss. This problem is a big issue at the boundary of wired and wireless networks, and it can cause streamed media applications to perform poorly. For streamed MPEG video, packet loss can induce an incorrect MPEG video bit-stream syntax. At the video player the corrupt stream leads to an improper decoding of frames resulting in a poor viewer experience that can include frame corruption, frame freezing and tiling artifacts. Even very few packet losses can result in a noticeable decay in perceived video quality. To solve this problem, we propose a deterministic in-network selective packet forwarding algorithm that preserves MPEG video syntax while reducing the bandwidth of the video stream to be below the bottleneck bandwidth. Optimality of the forwarding algorithm is achieved by solving a 0-1 knapsack problem using estimated video parameters. We evaluate the proposed scheme for real MPEG-2 and MPEG-4 video streams. The performance of the proposed algorithm is evaluated in terms of the reduction in the number of bit stream syntax errors in addition to the rate optimality.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121583795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust transferability among similar contexts","authors":"Mozhgan Tavakolifard, S. J. Knapskog, P. Herrmann","doi":"10.1145/1454586.1454603","DOIUrl":"https://doi.org/10.1145/1454586.1454603","url":null,"abstract":"Trust is a fundamental concern in electronic transactions and behavior of people are influenced by the situation. Motivated by that we present a state-of-the-art survey of context representation in trust management and provide main directions along which research efforts have been done. We propose a generalized model which considers different aspects of the relationship between context-awareness and trust management.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks","authors":"N. Sarma, Sukumar Nandi","doi":"10.1145/1454586.1454600","DOIUrl":"https://doi.org/10.1145/1454586.1454600","url":null,"abstract":"In this paper, we provide higher channel access priority to frames belonging to real-time traffic with smaller contention windows as compared to frames belonging to besteffort traffic. Further, to reduce channel access delay in multihop environment, we give higher access priorities to relayed frames, within a QoS class, as compared to the generated frames within the same class. Besides introducing channel access priorities at MAC layer, proper queuing management scheme is implemented to improve the QoS support at flow level. Both analytical and simulation results show the improved QoS for real-time traffic.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}